Business through Mobile Phone initiated Near Field Communication



Similar documents
Vitenkafe, Lillestrøm, Nov 2013 Livet er trådløs, Mobilen styrer

Using RFID Techniques for a Universal Identification Device

Frequently Asked Questions

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO

The mobile phone as a contactless ticket

Near Field Communication in Cell Phones

Gemalto Mifare 1K Datasheet

Store Logistics and Payment with Near Field Communication

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro

Security & Chip Card ICs SLE 44R35S / Mifare

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

SIM as Secure Key Storage in Communication Networks

advant advanced contactless smart card system

Time & Access System An RFID based technology

Chip Card & Security ICs Mifare NRG SLE 66R35

Application of Near Field Communication Technology for Mobile Airline Ticketing

How Does It Work? Internet of Things

Loyalty Systems over Near Field Communication (NFC)

INTEGRATED IDENTITY MECHANISM FOR UBIQUITOUS SERVICE ACCESS

RFID Penetration Tests when the truth is stranger than fiction

Your Mobile Phone as a Ticket (NFC)

INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors

Near Field Communication Technology and its Utilization in Mobile Telephones

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Security in Near Field Communication (NFC)

Using an NFC-equipped mobile phone as a token in physical access control

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

NACCU Migrating to Contactless:

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008

Cloud RFID UHF Gen 2

Nokia E61i Configuring connection settings

NFC. Technical Overview. Release r05

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

Self-Check-In Hotels Using RFID. Technology

Connecting your Aiki phone to a network

Configuring connection settings

PN532 NFC RFID Module User Guide

NFC Testing. Near Field Communication Research Lab Hagenberg. Gerald Madlmayr. NFC Research Lab, Hagenberg. E-Smart 2008, Sophia Antipolis

Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N Rev 003 Issue 1

How To Develop A Nordic Mobile Network (Mms) For A Cell Phone (Norshame) (Networking) (Mobile) (Cell Phone) (Geo) (Gsm) (Smart Antenna) (Network)

Vulnerability Analysis and Attacks on NFC enabled Mobile Phones

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

International Journal of Engineering Research & Management Technology

Master UNIK. Performing your Master Studies in. Wireless Networks and Information Security

a leap ahead in analog

Lionel Anciaux CEO. La technologie NFC au service du pointage géolocalisé des prestations. M: P: +32 (0)

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

HALYS VOIP to GSM SOLUTION

Cisco SPA525G2 5-Line IP Phone

Mobile and Contactless Payment Security

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Home Passport Gateway Series Simplify your Life with Smart Solutions

Secure Automatic Ticketing System

Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions

AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev October Document information

Radio Frequency Identification (RFID)

What is a Smart Card?

MIFARE ISO/IEC PICC

Users Manual of GSM Home Alarm System with Photo-taken

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:

Guard All Security Symposium. Identity and Access Management

telstra.com/ppmbb visit a telstra store or partner GETTING TO KNOW YOUR

GSM Risks and Countermeasures

CHAPTER 1 Introduction 1

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

MF1 IC S General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy

Teltonika FM41XX. Configurator v. 1.0

Smart Ride: European transit systems move to contactless mobile payments Trends and Developments, May 05, 2015

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev October Document information

The Wireless Library Technical and Organisatorial Aspects

LibRFID: Automation Software for Library Management System Using RFID Technology

GPS Vehicle and personal location tracker. User manual

mcard CPK Supported Solutions

U.S. Patent Appl. No. 13/ filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

RFID Design Principles

Towards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna

Remote Connection Options For Monitoring, Troubleshooting and Maintenance of Control Devices for OEM Machine Builders

APPFORUM2014. Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10

Training Webcast on Contactless Cards for Access Control. January 21, 2004

NFC Tags & Solutions. Understanding Near Field Communication (NFC) Technology. Executive Summary

RESEARCH SURVEY ON MIFARE WITH RFID TECHNOLOGY

Touch & Travel a SIM-based eticketing System

Tax Control and Security of M-Commerce in 3G Environments. ZheJiang WanLi University

Back, start, and search key Lock the keys and screen Unlock the keys and screen Set the keys and screen to lock automatically...

How To Use Nfc On A Mobile Phone

SA Oxford Workshop Summary to T#10 Bangkok, 6-8 December 2000

TABLE OF CONTENTS. Legend:

dedicated to the continous growth of technology Mobile smart card solution Security with style

15 May 2013 Version 5. for Mac OS X. Public version. Gemfor s.r.o. Tyršovo nám Roztoky Czech Republic

PD590-KT. Guide Android 4.4.2

Wireless Network Standard and Guidelines

Entrust IdentityGuard

Sony introduces Xperia E An affordable smartphone with HD Voice, data usage monitoring and battery power management

Mobile Office Security Requirements for the Mobile Office

Transcription:

Business through Mobile Phone initiated Near Field Communication Josef Noll 1, Juan Carlos Lopez Calvet, Telenor R&D,, N-1331 Fornebu josef@unik.no, juan.calvet@telenor.com 1 from 1.6.2005 Prof. stip. University Graduate Studies (UniK) N-2027 Kjeller Josef Noll, 11.5.2005 RFID & NFC 1

Need for an identifier Real world: see and/or talk Voice Face Virtual world: email, web Username, passwd SIM PKI Service world (between providers) Identity management Service level agreement (SLA) Trust relation Josef Noll, 11.5.2005 RFID & NFC 2

RFID communication modes RFID tag: - microchip attached to an antenna - sends signals to a reader. - contains a unique serial number, but may have other information, such as a customers' account number. Reader (passiv RFID): - Inductor to create electromagnetic field in tag - Receiver for radio response from tag (ROM-value: up to 600 bytes, typical 64-128 bits Inductive Coupling Propagation Coupling Aktive (own power) Range: ad lib (no limit) Passive (inductive) Range: from mm to some metres Josef Noll, 11.5.2005 RFID & NFC 3 Source: Tor Hjalmar Johannessen, Telenor

Potential Security Problems 1. Authentication: Cloning theft of RFID 2. Confidentiality Uncontrolled surveillance Security problem 1: RFID is easy to clone WARNING - hide a reader in a lift door, a chair, or other places you come close Read response and programme a separate tag with same RFID id. The user can t know where reading took place. Difficult to trace later on Security problem 2: Uncontrolled Surveillance -With hidden tags in clothes, money, credit card the user has no longer control when/where/how he can be detected. Organisations are active to stop RFID. Ref: www.stop-rfid.org Potential restrictions on the way in the USA. WARNING Josef Noll, 11.5.2005 RFID & NFC 4 Source: Tor Hjalmar Johannessen, Telenor

The Mobile Takes It All SIM with RFID & PKI Josef Noll, 11.5.2005 RFID & NFC 5

Seamless authentication Service access Physical access VPN Home access,.mp3,.jpg Josef Noll, 11.5.2005 RFID & NFC 6

Telenor s potential in RFID/NFC Authentication provision for service providers, e.g. Oslo Sporveier, Filmweb, SAS Braathens, Tickets and admittance (aircraft boarding) can be provided through SMS Physical access to buildings from mobile phone. Examples: Public Buildings, Building blocks, Company We have contacts to he Police in Asker/Bærum, to the Fornebu Eiendomsutvikling, and Telenor Eiendom VPN access to intranet information Replace the smartcard with the info you have on the phone (information exchange between phone and PC) Seamless access to digital content at home based on GSM authentication (not RFID) Josef Noll, 11.5.2005 RFID & NFC 7

Advantages of a RFID/SIM card Potentially every GSM mobile phone could adopt the technology Security concerns could be improved by having control of the RFID tag behaviour through the SIM card by blocking/opening the card Use the PKI infrastructure and the already established services (mcommerce) behind the SIM card GSM GPRS RFID System Marketing Mobil Handel Access Control INTERNET Personal ID Localization Josef Noll, 11.5.2005 RFID & NFC 8

Security Requirement Four-in-one: Your mobile integrates them all Have to know Need to know Nice to know Examples: mhandel, VPN Intranet, email, Admittance Network access & * * RFID & SIM passwd & RFID, SIM & PKI *& RFID (& SIM) Josef Noll, 11.5.2005 RFID & NFC 9 *Patent pending

Josef Noll, 11.5.2005 RFID & NFC 10

RFID payment usage coffee machines in Telenor R&D RFID card in 2005 Tests in OSL and Arlanda RFID cards Think Planned Q4.2005, Univ. Tromsø (N) Payment on coffee machine Payment Entrance to door B6e Entrance Josef Noll, 11.5.2005 RFID & NFC 11 Electronic access (VPN) - Telenor

Timeline: Phone with RFID & PKI SIM card with integrated RFID Prototypes available from: Giesecke & Devrient: demonstrated on Siemens phones Gemplus: both on one chip, (terminated) NFC Near Field Communication (NFC) Standardisation of Philips, Nokia, Sony, Phones with RFID chip Phone status: Nokia: on stock, Siemens: prototypes Josef Noll, 11.5.2005 RFID & NFC 12

Near Field Communication (NFC) is a touchbased RFID technology Technology NFC works in the globally available 13.56 MHz band The effective working distance is up to a few centimeters Based on ISO 18092 including ISO14443A MiFare and FeliCa standards, ie compatible with the most broadly established smart card infrastructure covering >80% of the market Tags Devices Tags in smart objects are powered by the radio signal of the reader, and do not require any battery or other source of power The tags contain some memory that can store URLs, SMS and similar information Costs currently a few ten EUR cents and decreasing rapidly Devices do not contain tags, but can communicate using the same interface Devices can not only read tags, but also write to enabled tags Josef Noll, 11.5.2005 RFID & NFC 13 Sources: Nokia, Froster & Sullivan; Forrester

Near field communication (NFC) Based on RFID technology at 13.56 MHz Typical operating distance 10 cm Compatible with RFID Data rate today up to 424 kbit/s Philips and Sony ECMA-340, ISO/IEC 18092 & ECMA-352, standards Powered and non-self powered devices Josef Noll, 11.5.2005 RFID & NFC 14

NFC near field communication in praxis [copyright: www.nfc-forum.org] - Example: streaming DRM Josef Noll, 11.5.2005 RFID & NFC 15

NFC near field communication in praxis [copyright: www.nfc-forum.org] - Example: travelling Josef Noll, 11.5.2005 RFID & NFC 16

NFC standardisation ECMA-340 Specifies the RF signal interface Initialisation, anticollision and protocols Communication mode selection mechanism ECMA 352 (v1, Dec 2003) Selects communication modes: NFC, PCD, and VCD Enables communication in that mode Josef Noll, 11.5.2005 RFID & NFC 17

NFCIP-2 Interface and protocol (ISO/IEC 21481) Interface Standards ECMA-340 Josef Noll, 11.5.2005 RFID & NFC 18 ISO/IEC 14443 PCD mode (MIFARE, FeliCa) ISO/IEC 15693 VCD mode (facility access)

ECMA: NFC work items & future plans Work items ECMA-356: RF interface tests for ECMA-340 devices ECMA-362: Protocol Test Methods Future working items A mapping of NFC to other communication protocols including the Internet Protocol (IP), GSM and Bluetooth Advanced Logical Link Control with addressing and segmentation support Support for Data Link and end-to-end security and key management Air-to-wired interface specification Application extensions in NFCIP-1 Power control as an example application extension Josef Noll, 11.5.2005 RFID & NFC 19

NFC changes the role of the mobile operator The mobile operator is the communication provider Everybody has a mobile phone People know that they can reach me and not my parents Companies have identified the value of personal phones and change their infrastructure The phone carries all my contacts Connected 24/7 (all the time, not just 4 h a day) From access to communication Provide communication: voice, SMS, MMS, IM, email,. Seamless login (wap.telenormobil.no) my email, last 10 visited Provide presence and community services Provide authentication and security Josef Noll, 11.5.2005 RFID & NFC 20

Conclusion: Security & Authentication The last time we were connected by a wire was at birth! [Motorola] Services are mobile: On various radio systems: GSM, UMTS; WLAN, Bluetooth, DVB, Device limitations: battery, integration Changed role of operator: Communication provider All services authenticated by/through your mobile Appropriate security for each application Josef Noll, 11.5.2005 RFID & NFC 21

Challenges and way forward Josef Noll, 11.5.2005 RFID & NFC 22

Security infrastructure Security depends on application Nice to know: WLAN network access Need to know: email, Intranett Have to know: VPN, (ecommerce) Higher level require more than just username & password http://www.openauthentication.org/ suggests 3 methods SIM authentication (GSM, EAP-SIM, ) Public Key Infrastructure (PKI) One-Time-Password (OTP) In-line with requirements from Norwegian government for esignature Depending on application: username & password or PKI The Mobile phone has all three: SIM, PKI, and OTP Challenge: Usability and exchange of credentials to my working devices Josef Noll, 11.5.2005 RFID & NFC 23

What is going on out there? Josef Noll, 11.5.2005 RFID & NFC 24

Users have three main areas of interest in proximity interaction Sharing experiences Sharing the rich content that we create every day with our friends and family Transferring our digital content between our own devices Information form about things they see Easily accessing digital services related to items that we see in our environment Simple access to on-line content from physical objects Simple and easy transactions Using a convenient, connected and secure way of paying Buying, storing and using tickets where ever, when ever * Depending on the availability of DRM that allow this Josef Noll, 11.5.2005 RFID & NFC 25

Touch to share a link or content The use case: With a touch, mobile terminals exchange web links or content A (BT) link is set up and the content transferred automatically Key benefits: Easy viral marketing of links Increased use of camera and MMS by enabling more content on phones Create a pattern of mobile as content hub Increased usability Josef Noll, 11.5.2005 RFID & NFC 26 Future opportunities: Can be easily extended to share

Touch to get services and content in store The use case: In-shop advertisements of content and services by use of tags in phone store In music stores ringtone ads next to albums, e.g., latest album from Beyoncé Key benefits: Operator revenue from data and content billing Usability: easy service discovery and access Josef Noll, 11.5.2005 RFID & NFC 27

Touch to pair devices The use case: Tagged headsets provide BT parameters when touched BT link setup and pairing automatically initiated from terminal Key benefits: Increased usability True out-of-the-box readiness for headsets Future opportunities: Any other BT enhancement, e.g. picture sharing with image frames, media viewers Josef Noll, 11.5.2005 RFID & NFC 28

Touch to subscribe to services The use case: Along with the monthly bill or promotional mail, users get tags for services on offer. By touching the tag, users can configure service settings or subscribe to mobile services (e.g. soccer news). Key benefits: New service advertising channel Operator revenue (data, service subscriptions) Superior user experience User education: recurrent reminder of available services Josef Noll, 11.5.2005 RFID & NFC 29